''' Just fill in the ZAP User Questionnaire which is available in [https://docs.google.com/forms/d/1lUPTYHe9CS5tropNStoRK9jVeZ7tWRywhBHDIZjE4cA/viewform English], [https://docs.google.com/forms/d/1JhUdp4cxZ3qRayYWz3JHOLSP7DPdBI-zgnFzDWxbX5A/viewform French], [https://docs.google.com/forms/d/1xAKE3TCOaBrmFnyAVUr6NdTd3mKvu7g_uGriOcS2Ka4/viewform Spanish] and now [https://docs.google.com/forms/d/1qN3MlRcjQk9riIkdpfnJLkFd4cW5ALp136da08xvMaA/viewform Arabic]!! '''

+

ZAP is taking part in the '''Google Summer of Code 2014'''. See the [https://www.owasp.org/index.php/GSoC2014_Ideas#OWASP_ZAP_-_Advanced_access_control_testing OWASP wiki] for suggested projects. And if you have any questions about this please ask them on the [http://groups.google.com/group/zaproxy-develop ZAP dev group]

−

You can view the responses so far (which are separate for each languages) here: [https://docs.google.com/forms/d/1lUPTYHe9CS5tropNStoRK9jVeZ7tWRywhBHDIZjE4cA/viewanalytics English], [https://docs.google.com/forms/d/1JhUdp4cxZ3qRayYWz3JHOLSP7DPdBI-zgnFzDWxbX5A/viewanalytics French], [https://docs.google.com/forms/d/1xAKE3TCOaBrmFnyAVUr6NdTd3mKvu7g_uGriOcS2Ka4/viewanalytics Spanish], [https://docs.google.com/forms/d/1qN3MlRcjQk9riIkdpfnJLkFd4cW5ALp136da08xvMaA/viewanalytics Arabic]

+

''' ZAP Is the [http://www.toolswatch.org/2013/12/2013-top-security-tools-as-voted-by-toolswatch-org-readers/ Top Security Tool of 2013 as voted by ToolsWatch.org readers]! '''

For a quick overview of ZAP and to see some of the latest ZAP features see these tutorial videos on YouTube:

For a quick overview of ZAP and to see some of the latest ZAP features see these tutorial videos on YouTube:

Line 41:

Line 36:

For more details about ZAP, including the full user guide, see the [https://code.google.com/p/zaproxy/wiki/Introduction wiki].

For more details about ZAP, including the full user guide, see the [https://code.google.com/p/zaproxy/wiki/Introduction wiki].

+

+

We recently asked our users for feedback about ZAP, you can see their responses (which are separate for each languages) here: [https://docs.google.com/forms/d/1lUPTYHe9CS5tropNStoRK9jVeZ7tWRywhBHDIZjE4cA/viewanalytics English], [https://docs.google.com/forms/d/1JhUdp4cxZ3qRayYWz3JHOLSP7DPdBI-zgnFzDWxbX5A/viewanalytics French], [https://docs.google.com/forms/d/1xAKE3TCOaBrmFnyAVUr6NdTd3mKvu7g_uGriOcS2Ka4/viewanalytics Spanish], [https://docs.google.com/forms/d/1qN3MlRcjQk9riIkdpfnJLkFd4cW5ALp136da08xvMaA/viewanalytics Arabic]

<paypal>Zed Attack Proxy</paypal>

<paypal>Zed Attack Proxy</paypal>

Line 102:

Line 99:

* [http://www.dinosec.com/ DinoSec]

* [http://www.dinosec.com/ DinoSec]

* [http://www.denimgroup.com Denim Group]

* [http://www.denimgroup.com Denim Group]

+

* [http://www.aspectsecurity.com/ Aspect Security]

* [http://secureideas.net SecureIdeas]

* [http://secureideas.net SecureIdeas]

* [http://utilisec.com UtiliSec]

* [http://utilisec.com UtiliSec]

Line 181:

Line 179:

<div style="font-size:120%;border:none;margin: 0;color:#000">

<div style="font-size:120%;border:none;margin: 0;color:#000">

−

==Release 2.2.0==

+

==Release 2.3.0==

−

ZAP 2.2.0 has been released, which includes:

+

ZAP 2.3.0 has been released, which includes:

−

* Support for scripts embedded in ZAP components like the active and passive scanners.

+

* A ZAP 'lite' version in addition to the existing 'full' version

−

* Support for [https://blog.mozilla.org/security/2013/08/22/plug-n-hack/ Plug-n-Hack]

Every time an application faces the world wide web, it inherently becomes vulnerable to attacks. The attackers could be script kiddies, joyriders, turning from hobbyists to downright hostile. The earlier in the development cycle you find the vulnerabilities, the better they are to fix and test.

OWASP ZAP is a free and open source penetration testing tool for finding vulnerabilities in web applications; widely used by security professionals, it is also ideal for anyone new to web application security and includes features specifically aimed at developers.

This session shows/demonstrates some attacks against web applications and how OWASP ZAP could be used to find those vulnerabilities, both manually and by automated builds.

Release description:This release includes the following significant changes:

Fuzzing: Strings in a response can now be fuzzed to try to find vulnerabilities. Anti CRSF tokens can be detected and automatically regenerated when fuzzing. This functionality is based on code from the OWASP JBroFuzz project.

Dynamic SSL certificates: The support for SSL connections was improved and simplified. User's can now create their own root certificate and distribute this into their HTTP clients.

Daemon mode: Starting ZAP with the "-daemon" command line option will cause it to run in the background in 'headless' mode, meaning that no UI is displayed.

API: An initial API has been implemented in XML, JSON and HTML.

Beanshell integration: The BeanShell is an interactive Java shell that can be used to execute BeanShell scripts. BeanShell integration in OWASP ZAP enables you to write scripts using the ZAP functions and data set.

Full internationalisation: All displayed strings are now fully internationalised.

Localisation: Out of the box support for the following languages: English, Brazilian Portuguese, Chinese, French, German, Greek, Indonesian, Japanese, Polish, Spanish